This article discusses the methods for collecting Dell Threat Defense logs.
Click Windows or Mac for more information.
A Dell Threat Defense administrator can gather either Threat Defense logs or MSI logs. Click the appropriate log type for more information.
Dell Threat Defense documents threat info, event data, policy changes, build updates, and registration within its own product logging. These logs should be gathered when troubleshooting issues with Dell Threat Defense.
C:\Program Files\Cylance\Desktop\log
.A new log is generated every day with a date stamp as a title. Each log is capped at 100 MB. If this limit is reached, the active log file is indexed, and a new daily log file is created. Up to 30 daily logs are available at one time before rolling over.
Dell Threat Defense uses Microsoft Installer (MSI) logs to record product install and uninstall information. If a device is having issues with installing or uninstalling Dell Threat Defense, then MSI logs may provide additional insight on the root cause.
%temp%
and then click OK.%temp%
that begins with Dell_Threat_Defense
.A Dell Threat Defense administrator can gather Threat Defense logs, the Install log, or the System log. Click the appropriate log type for more information.
Dell Threat Defense documents threat info, event data, policy changes, build updates, and registration within its own product logging. These logs should be gathered when troubleshooting issues with Dell Threat Defense.
/Library/Application Support/Cylance/Desktop/Log
and then press OK.A new log is generated every day with a date stamp as a title. Each log is capped at 100 MB. If this limit is reached, the active log file is indexed, and a new daily log file is created. Up to 30 daily logs are available at one time before rolling over.
Dell Threat Defense uses the native install.log
to document installation information. The install.log may provide additional insight on the root cause of installation issues with Dell Threat Defense.
/var/log
and then press OK.install.log
to another area for further investigation.install.log
contains information about application and Mac updates. It is recommended to search for "Cylance
" to ensure that the information is relevant to Dell Threat Defense.
Dell Threat Defense uses the native system.log
to document uninstall information. The system.log may provide additional insight on the root cause of uninstall issues with Dell Threat Defense.
/var/log
and then press OK.system.log
to another area for further investigation.system.log
contains information about all applications residing on a device. It is recommended to search for "Cylance
" to ensure that the information is relevant to Dell Threat Defense.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.